Digital authentication with copy-detection patterns, Optical Security and Counterfeit Deterrence Techniques V, pp.176-183, 2004. ,
DOI : 10.1117/12.528055
Physical One-Way Functions, Science, vol.297, issue.5589, pp.2026-2030, 2002. ,
DOI : 10.1126/science.1074376
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.83.6166
2D Bar-Codes for Authentication : A Security Approach, Proc. of EUSIPCO, Romania, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00709394
Modeling the print-scan process for resilient data hiding, Security, Steganography, and Watermarking of Multimedia Contents VII, 2005. ,
DOI : 10.1117/12.588002
The Sum of Log-Normal Probability Distributions in Scatter Transmission Systems, IEEE Transactions on Communications, vol.8, issue.1, pp.57-67, 1960. ,
DOI : 10.1109/TCOM.1960.1097606